Publication: Counter-interception and counter-exploitation features of noise radar technology
dc.contributor.coauthor | Galati, Gaspare | |
dc.contributor.coauthor | Pavan, Gabriele | |
dc.contributor.coauthor | Wasserzier, Christoph | |
dc.contributor.department | Department of Electrical and Electronics Engineering | |
dc.contributor.kuauthor | Savcı, Kubilay | |
dc.contributor.other | Department of Electrical and Electronics Engineering | |
dc.contributor.schoolcollegeinstitute | Graduate School of Sciences and Engineering | |
dc.date.accessioned | 2024-11-09T13:46:56Z | |
dc.date.issued | 2021 | |
dc.description.abstract | In defense applications, the main features of radars are the Low Probability of Intercept (LPI) and the Low Probability of Exploitation (LPE). The counterpart uses more and more capable intercept receivers and signal processors thanks to the ongoing technological progress. Noise Radar Technology (NRT) is probably a very effective answer to the increasing demand for operational LPI/LPE radars. The design and selection of the radiated waveforms, while respecting the prescribed spectrum occupancy, has to comply with the contrasting requirements of LPI/LPE and of a favorable shape of the ambiguity function. Information theory seems to be a “technologically agnostic” tool to attempt to quantify the LPI/LPE capability of noise waveforms with little, or absent, a priori knowledge of the means and the strategies used by the counterpart. An information theoretical analysis can lead to practical results in the design and selection of NRT waveforms. | |
dc.description.fulltext | YES | |
dc.description.indexedby | WoS | |
dc.description.indexedby | Scopus | |
dc.description.issue | 22 | |
dc.description.openaccess | YES | |
dc.description.publisherscope | International | |
dc.description.sponsoredbyTubitakEu | N/A | |
dc.description.sponsorship | N/A | |
dc.description.version | Publisher version | |
dc.description.volume | 13 | |
dc.format | ||
dc.identifier.doi | 10.3390/rs13224509 | |
dc.identifier.eissn | 2072-4292 | |
dc.identifier.embargo | NO | |
dc.identifier.filenameinventoryno | IR03334 | |
dc.identifier.link | https://doi.org/10.3390/rs13224509 | |
dc.identifier.quartile | Q1 | |
dc.identifier.scopus | 2-s2.0-85119151226 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/3736 | |
dc.identifier.wos | 771958500003 | |
dc.keywords | Electronic support measures | |
dc.keywords | Electronic warfare | |
dc.keywords | Low probability of intercept | |
dc.keywords | Noise radar | |
dc.keywords | Pseudorandom numbers | |
dc.keywords | Radar signal processing | |
dc.keywords | Random processes | |
dc.keywords | Signal analysis | |
dc.language | English | |
dc.publisher | Multidisciplinary Digital Publishing Institute (MDPI) | |
dc.relation.grantno | NA | |
dc.relation.uri | http://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/10116 | |
dc.source | Remote Sensing | |
dc.subject | Environmental sciences | |
dc.subject | Ecology | |
dc.subject | Geology | |
dc.subject | Remote sensing | |
dc.subject | Imaging science and photographic technology | |
dc.title | Counter-interception and counter-exploitation features of noise radar technology | |
dc.type | Journal Article | |
dspace.entity.type | Publication | |
local.contributor.kuauthor | Savcı, Kubilay | |
relation.isOrgUnitOfPublication | 21598063-a7c5-420d-91ba-0cc9b2db0ea0 | |
relation.isOrgUnitOfPublication.latestForDiscovery | 21598063-a7c5-420d-91ba-0cc9b2db0ea0 |
Files
Original bundle
1 - 1 of 1